Friendzone
The initial Nmap scans shows the following ports opened:
21, 22, 53, 80, 139, 443.
Lets start with port 80. The site displays a web page that says “Have you ever been friendzoned?” with an image. The source code doesn’t show much, it was coded with simple HTML tags.
GoBuster scans shows an accessible robots.txt and word...
HDC
On the main page, it shows a simple login form. The first thing I did is browse around the source code and see if there are any hidden username and passwords. There are two js files, jquery-3.2.1.js and myscripts.js that I looked into.
myscripts.js has a function named doProcess() which handles the submission I would imagine. Let’s ta...
Traverxec
nmap scans show port 22 and 80 is opened. Port 80 displays a basic bootstrap template and nothing stands out in the source code when inspected. After checking out the nmap results in detail, I noticed the HTTP server header displays nostromo 1.9.6.
After researching what nostromo server is about, it’s a lightweight http server. Searchi...
Netmon
Nmap scans show FTP is open on port 21 with allowed anonymous access. Looking through the directories, I found the user.txt flag, that was way too easy.
Nmap scans show Netmon is running a web server on port 80. The web server is hosting a web application called PRTG which is a network monitoring software. The version 18.1.37.139...
Pentesting Azure Applications
Currently reading
Amazon Link
1: Preparation
Clouds are reasonably secure by default
As a penetration tester, if the project scope is limited to one cloud-hosted server and you can’t include anything else in the test, you’re likely to fail and give the impression that their cloud assets are impenetrable.
...
Lernaean
“Your target is not very good with computers. Try and guess their password to see if they may be hiding anything!”
This challenge wasn’t too bad. The parts that I struggled with was getting the right syntax for hydra and putting together a post request script in Ruby which I’ve partially borrowed from Emdee five for life - Web challenge.
...
Emdee Five For Life
“Can you encrypt fast enough?”
This was my first challenge on HTB. It was fun and a little bit challenging. I couldn’t write this in Python as it was annoying for something this simple. I should do it in Python though so at least I understand how to write HTTP responses. In Ruby, I had less of trouble as the documentation is better and understa...
Cartographer
“Some underground hackers are developing a new command and control server. Can you break in and see what they are up to?”
This challenge was finding out if you can bypass the login screen. At first, I thought the hint was Cartography so I thought that “oh, maybe I take the .png image and decode the message using steganography tools.” Nope, ...
48 post articles, 6 pages.